Reed Elsevier

Displaying 1-40 of 897 results

  • White Papers // May 2012

    An Energy-Centric Handover Decision Algorithm for the Integrated LTE Macrocell - Femtocell Network

    Femtocells are attracting a fast increasing interest now-a-days, as a promising solution to improve indoor coverage and system capacity. Due to the short transmit-receive distance, femtocells can greatly lower transmit power, prolong handset battery life, and enhance the user-perceived Quality of Service (QoS). On the other hand, technical challenges still...

    Provided By Reed Elsevier

  • White Papers // May 2012

    Reducing Virtual-to-Physical Address Translation Overhead in Distributed Shared Memory Based Multi-Core Network-on-Chips According to Data Property

    In Network-on-Chip (NoC) based multi-core platforms, Distributed Shared Memory (DSM) preferably uses virtual addressing in order to hide the physical locations of the memories. However, this incurs performance penalty due to the Virtual-To-Physical (V2P) address translation overhead for all memory accesses. Based on the data property which can be either...

    Provided By Reed Elsevier

  • White Papers // Apr 2012

    Node Localization Through Physical Layer Network Coding: Bootstrap, Security, and Accuracy

    Previous research on Physical-layer Network Coding (PNC) focuses on the improvements in bandwidth usage efficiency. Its capability to assist wireless nodes in localization was first discussed. In that paper, however, the authors discussed only the basic idea to detect and separate the interfered signals for calculating the node positions. Many...

    Provided By Reed Elsevier

  • White Papers // Apr 2012

    A Green Handover Protocol in Two-Tier OFDMA Macrocell - Femtocell Networks

    Femtocells are a promising technology to improve network performance with the short-range, low-power, and cost-beneficial small base stations. A femtocell is a low-power wireless access point that operates in licensed spectrum to connect a standard device to an operator's network using a Digital Subscriber Line (DSL) connection. Most of the...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Secure Neighbor Discovery and Wormhole Localization in Mobile Ad Hoc Networks

    Neighbor discovery is an important part of many protocols for wireless ad hoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Network Coding-Based Cooperative ARQ Scheme for VANETs

    In this paper, the authors introduce a novel network coding-based Medium Access Control (MAC) protocol for Vehicular Ad-hoc NETworks (VANETs) that use cooperative Automatic Repeat reQuest (ARQ) techniques. Their protocol coordinates the channel access among a set of relays capable of using network coding in order to minimize the number...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Towards a Reputation-Based Routing Protocol to Contrast Blackholes in a Delay Tolerant Network

    A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate towards message forwarding. However, this assumption cannot be satisfied when there are malicious nodes acting as blackholes and voluntarily attracting and dropping messages. In this paper, the authors propose a reputation-based protocol for contrasting blackholes. Every node...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Methodology for Public Administrators for Selecting Between Open Source and Proprietary Software

    The public sector needs to change over to communicating digitally. This development makes great demands both on work processes in the public sector and on the Information Technology systems, on which e-government is based. From the economic perspective, the change-over poses great challenges, as huge investments will have to be...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    A Bandwidth and Effective Hit Optimal Cache Scheme for Wireless Data Access Networks With Client Injected Updates

    In this paper, the authors propose an optimal cache replacement policy for data access applications in wireless networks where data updates are injected from all the clients. The goal of the policy is to increase effective hits in the client caches and in turn, make efficient use of the network...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    Towards Mobile Intelligence: Learning From GPS History Data for Collaborative Recommendation

    With the increasing popularity of location-based services, the authors have accumulated a lot of location data on the Web. In this paper, the authors are interested in answering two popular location-related queries in their daily life: if the people want to do something such as sightseeing or dining in a...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    A Simulation Modelling Tool for Distributed Virtual Environments

    Distributed Virtual Environments simulate the behavior and activities of a great number of users interacting in a virtual world over a wide area network. The size of the virtual worlds and the tremendous number of users that these environments are called to support require additional bandwidth and computational resources. For...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    Sleep-Based Topology Control in the Ad Hoc Networks by Using Fitness Aware Learning Automata

    Learning automata have been found to be useful in the systems with incomplete knowledge. Therefore, it can be used as a tool to solve problems of Ad Hoc networks, where nodes are mobile and operate within a dynamic environment, which entails possibly unknown and time varying characteristics. In this paper,...

    Provided By Reed Elsevier

  • White Papers // Jan 2012

    Team Formation and Steering Algorithms for Underwater Gliders Using Acoustic Communications

    In order to take measurements in space and time from the under-sampled vast ocean, it is necessary to employ multiple autonomous underwater vehicles, such as gliders, that communicate and coordinate with each other. These vehicles need to form a team in a specific formation, steer through the 3D region of...

    Provided By Reed Elsevier

  • White Papers // Jan 2012

    Referential Integrity Quality Metrics

    Referential integrity is an essential global constraint in a relational database, that maintains it in a complete and consistent state. In this paper, the authors assume the database may violate referential integrity and relations may be de-normalized. They propose a set of quality metrics, defined at four granularity levels: database,...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    A Historical Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing

    Cloud computing promises an open environment where customers can deploy IT services in pay-as-you-go fashion while saving huge capital investment in their own IT infrastructure. Due to the openness, various malicious service providers can exist. Such service providers may record service requests from a customer and then collectively deduce the...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    ActiSen: Activity-Aware Sensor Network in Smart Environments

    A sensor network, unlike a traditional communication network, provides high degree of visibility into environmental physical processes. Therefore, its operation is driven by the activities in the environment. In long-term operations, these activities usually show certain patterns which can be learned and utilized to optimize network design. However, this has...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Efficient Audit Service Outsourcing for Data Integrity in Clouds

    Cloud-based outsourced storage relieves the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. To avoid the security...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Practical and Secure Localization and Key Distribution for Wireless Sensor Networks

    In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with legitimate in-network communication. In this paper, the authors introduce Secure Walking GPS, a practical and cost effective secure localization and key distribution solution for...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    A Structural Approach for PoP Geo-Location

    Inferring PoP level maps is gaining interest due to its importance to many areas, e.g., for tracking the Internet evolution and studying its properties. In this paper, the authors introduce a novel structural approach to automatically generate large scale PoP level maps using trace-route measurement from multiple locations. The PoPs...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Talent Scouting in P2P Networks

    Record labels would like to identify potential artists as early as possible in their career, before other companies approach the artists with competing contracts. However, there are a huge number of new artists, and the process of identifying the ones with high success potential is labor intensive. This paper demonstrates...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Low-Dimensional Signal-Strength Fingerprint-Based Positioning in Wireless LANs

    Accurate location awareness is of paramount importance in most ubiquitous and pervasive computing applications. Numerous solutions for indoor localization based on IEEE802.11, Bluetooth, ultrasonic and vision technologies have been proposed. This paper introduces a suite of novel indoor positioning techniques utilizing Signal-Strength (SS) fingerprints collected from Access Points (APs). The...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    ORACLE: Mobility Control in Wireless Sensor and Actor Networks

    Mobile actor is a promising tool for Wireless Sensor and Actor Networks (WSANs) provisioning energy and time efficient data collection. In this paper, the authors study actors' mobility control in WSANs for efficient events detecting in terms of time and energy consumption. They introduce an innovative approach ORACLE, to make...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Pure Embedding of Attribute Grammars

    Attribute grammars are a powerful specification paradigm for many language processing tasks, particularly semantic analysis of programming languages. Recent attribute grammar systems use dynamic scheduling algorithms to evaluate attributes on demand. In this paper, the authors show how to remove the need for a generator, by embedding a dynamic approach...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Trust Negotiation Based Security Framework for Service Provisioning in Load-Balancing Clusters

    The OKKAM project aims at enabling the Web of Entities, a global digital space for publishing and managing information about entities. The project provides a scalable and sustainable infrastructure, called the Entity Name System (ENS), for the systematic reuse of global and unique entity identifiers. The ENS provides a collection...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    On Scrambling the Burrowse-Wheeler Transform to Provide Privacy in Lossless Compression

    The usual way of ensuring the confidentiality of the compressed data is to encrypt it with a standard encryption algorithm. Although the computational cost of encryption is practically tolerable in most cases, the lack of flexibility to perform pattern matching on the compressed data due to the encryption level is...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Semantically Enhanced Service Repository for User-Centric Service Discovery and Management

    User centricity represents a new trend in the currently flourishing service oriented computing era. By upgrading end-users to prosumers (producer+consumer) and involving them in the process of service creation, both service consumers and service providers can benefit from a cheaper, faster, and better service provisioning. The EU-IST research project OPUCE...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Robust Hashing Algorithm Based on SURF for Video Copy Detection

    To protect digital video from unauthorized use, video copy detection is an active research topic in the field of copyright control. For content-based copy detection, the key issue is to extract robust transformation-invariant feature. In this paper, a robust hashing algorithm based on Speeded Up Robust Feature (SURF) and Ordinal...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    QoS and Preemption Aware Scheduling in Federated and Virtualized Grid Computing Environments

    Resource provisioning is one of the challenges in federated Grid environments. In these environments each Grid serves requests from external users along with local users. Recently, this resource provisioning is performed in the form of Virtual Machines (VMs). The problem arises when there are insufficient resources for local users to...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    Tracing and Revoking Scheme for Dynamic Privileges Against Pirate Rebroadcast

    Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel so that only the qualified users can recover the data. Currently, there are only two broadcast encryption schemes designed for users with different privileges. In these schemes, users with higher privileges can decrypt...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    100GbE and Beyond for Warehouse Scale Computing Interconnects

    Increasing broadband penetration in the last few years has resulted in a dramatic growth in innovative, bandwidth-intensive applications that have been embraced by the consumers. Coupled with this consumer trend is the migration from local compute/storage model to a cloud computing paradigm. As computation and storage continues to move from...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Long-Term Availability Prediction for Groups of Volunteer Resources

    Volunteer computing uses the free resources in Internet and Intranet environments for large-scale computation and storage. Currently, 70 applications use over 12 Peta-FLOPS of computing power from such platforms. However, these platforms are currently limited to embarrassingly parallel applications. In an effort to broaden the set of applications that can...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Looking Ahead in Pervasive Computing: Challenges and Opportunities in the Era of Cyber - Physical Convergence

    The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source information and respond to appropriate stimuli. In this technology-rich scenario, real-world components interact with cyberspace via sensing, computing and communication...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Biconnecting a Network of Mobile Robots Using Virtual Angular Forces

    This paper addresses the problem of self-deploying a swarm of wireless mobile robots in a biconnected fashion. The motivations for deploying robotic sensor networks in general include accessing places where human cannot go (e.g. remote planets, underwater area, dangerous spots with chemical or radioactive leaks), or automating fastidious large scale...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Compressive Sampling Based Differential Detection for UWB Impulse Radio Signals

    Non-coherent detectors significantly contribute to the practical realization of the UltraWide-Band (UWB) Impulse-Radio (IR) concept, in that they allow avoiding channel estimation and provide highly efficient reception capabilities. Complexity can be reduced even further by resorting to an all-digital implementation, but Nyquist-rate sampling of the received signal is still required....

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    TDMA Scheduling for Event-Triggered Data Aggregation in Irregular Wireless Sensor Networks

    Multi-hop wireless sensor networks often use a TDMA schedule to collect data periodically from multiple locations within a large area. If the measurements from neighboring sensors are cross-correlated, they can be aggregated and compressed as they travel to the data sink. In order for data aggregation to occur quickly, the...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Content Delivery and Caching From a Network Provider's Perspective

    An ongoing challenge in telecommunication is to integrate a variety of services on broadband access platforms at increasing transmission speed. Traditional Internet services, such as file transfer, email and web browsing, are now running on common multi-service IP platforms together with voice, video and television over IP, online gaming, P2P...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Session Level Flow Classification by Packet Size Distribution and Session Grouping

    Classifying traffic into specific network applications is essential for application-aware network management and it becomes more challenging because modern applications complicate their network behaviors. While port number-based classifiers work only for some well-known applications and signature-based classifiers are not applicable to encrypted packet payloads, researchers tend to classify network traffic...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Research Challenges Towards the Future Internet

    The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture and protocols well beyond their original design. This calls for extraordinary research efforts at all levels of...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    A New Adaptive Receiver-Initiated Scheme for Mitigating Starvation in Wireless Networks

    Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters are within the range of each other. Unfortunately, in multi-hop topologies, the asymmetric view of the channel state leads to a throughput distribution where a few flows...

    Provided By Reed Elsevier

  • White Papers // Aug 2011

    TCP Slow Start With Fair Share of Bandwidth

    The initial start-up performance of TCP largely depends on two parameters - ssthresh and cwnd. When these values are not accurate, TCP cannot utilize the bandwidth fully or may generate multiple packet drops. Unfortunately, estimating these parameters is not easy since little network state information is available for the TCP...

    Provided By Reed Elsevier

  • White Papers // Nov 2009

    Survey on Anonymous Communications in Computer Networks

    Anonymous communications aim to preserve communications privacy within the shared public network environment. It can provide security well beyond content privacy and integrity. The scientific studies of anonymous communications are largely originated from Chaum's two seminal approaches: mixnet and DC-net. In this paper, the authors present an overview of the...

    Provided By Reed Elsevier

  • White Papers // Sep 2009

    An Overview of Channel Assignment Methods for Multi-Radio Multi-Channel Wireless Mesh Networks

    Channel Assignment (CA) is an active research area due to the proliferating deployments of multi-radio multi-channel wireless mesh networks. This paper presents an in-depth survey of some of the CA approaches in the literature. First, the key design issues for these approaches are identified, laying down the basis for discussion....

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    GeoCross: A Geographic Routing Protocol in the Presence of Loops in Urban Scenarios

    In this paper, the authors propose GeoCross, a simple, yet novel, event-driven geographic routing protocol that removes cross-links dynamically to avoid routing loops in urban Vehicular Ad Hoc Networks (VANETs). GeoCross exploits the natural planar feature of urban maps without resorting to cumbersome planarization. Its feature of dynamic loop detection...

    Provided By Reed Elsevier

  • White Papers // Jan 2009

    Joint Rate and Cooperative MIMO Scheme Optimization for Uniform Energy Distribution in Wireless Sensor Networks

    An energy efficient adaptive rate cooperative MIMO selection scheme is proposed for uniform load distribution in the cluster based wireless sensor networks. The intrinsic data flow direction in multi-hop cluster based sensor networks causes uneven load distribution in the network. The transit clusters and the clusters near the base station...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Reputation-Based Dependable Scheduling of Workflow Applications in Peer-to-Peer Grids

    Grids facilitate creation of wide-area collaborative environment for sharing computing or storage resources and various applications. Inter-connecting distributed Grid sites through peer-to-peer routing and information dissemination structure (also known as peer-to-peer Grids) is essential to avoid the problems of scheduling efficiency bottleneck and single point of failure in the centralized...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    Cloud Computing for Education: A New Dawn?

    Educational establishments continue to seek opportunities to rationalize the way they manage their resources. The economic crisis that befell the world following the near collapse of the global financial system and the subsequent bailouts of local banks with billions of tax payers' money will continue to affect educational establishments that...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    VPAL: Video Packet Adaptation Layer for Reliable Video Multicast Over IEEE 802.11n WLAN

    In this paper, the authors propose a scheme, called Video Packet Adaptation Layer (VPAL), for reliable video multicast over the IEEE 802.11n WLAN. VPAL is composed of raptor coding for reliable video transmission, header compression and packet aggregation, both for efficient video transmission. Most of the VPAL functionalities reside above...

    Provided By Reed Elsevier

  • White Papers // Mar 2011

    Adaptive Sleep Mode Management in IEEE 802.16m Wireless Metropolitan Area Networks

    The emerging IEEE 802.16m standard provides a new sleep mode operation for Mobile Stations (MSs). It evolves from the sleep mode operation in the IEEE 802.16 standard but with more advanced features, e.g., the listening window may be extended and the sleep cycle length is adjustable. To fully exploit these...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    A Performance Analysis of Block ACK Scheme for IEEE 802.11e Networks

    The demand for the IEEE 802.11 Wireless Local-Area Networks (WLANs) has been drastically increasing along with many emerging applications and services over WLAN. However, the IEEE 802.11 Medium Access Control (MAC) is known to be limited in terms of its throughput performance due to the high MAC overhead, such as...

    Provided By Reed Elsevier

  • White Papers // Jun 2009

    Energy-Aware WLAN Scanning in Integrated IEEE 802.16e/802.11 Networks

    The authors consider an issue arising in a Vertical HandOff (VHO) between IEEE 802.16e and IEEE 802.11 networks, i.e., how efficiently the scanning operation can be controlled to find a target Wireless Local Area Network (WLAN) Access Point (AP). For this purpose, they propose that the 802.16e Base Stations (BSs)...

    Provided By Reed Elsevier

  • White Papers // Jun 2011

    Fault-Tolerant Monitor Placement for Out-of-Band Wireless Sensor Network Monitoring

    Monitoring a sensor network to quickly detect faults is important for maintaining the health of the network. Out-of-band monitoring, i.e., deploying dedicated monitors and transmitting monitoring traffic using a separate channel, does not require instrumenting sensor nodes, and hence is flexible (can be added on top of any application) and...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    Multi-Dimensional Evidence-Based Trust Management With Multi-Trusted Paths

    Trust management is an extensively investigated topic. A lot of trust models and systems have been proposed in the literature. However, a universally agreed trust model is rarely seen due to the fact that trust is essentially subjective and different people may have different views on it. The authors focus...

    Provided By Reed Elsevier

  • White Papers // Apr 2011

    Capability Information: A Cost-Effective Information Model for Multi-Hop Routing of Wireless Ad Hoc Networks in the Real Environment

    In greedy routing, each relay node forwards the message to a neighbor (also called the successor) that is closer to the destination. However, the Successor Candidate Set (SCS) is different every time the relative location of the relay node to the destination changes. The configuration in the entire network, when...

    Provided By Reed Elsevier

  • White Papers // Dec 2009

    On the Capacity of Multi-Packet Reception Enabled Multi-Channel Multi-Interface Wireless Networks

    Multi-Packet Reception (MPR) offers increased number of concurrent transmissions, which improves the capacity of wireless Ad hoc networks. By equipping each node with multiple wireless interfaces, the transmissions can be separated into different channels and the throughput can be increased. Combining these two technologies, this paper studies the capacity of...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    Clustering-Based Location in Wireless Networks

    In this paper, the authors propose a three-phase methodology (measurement, calibration and estimation) for locating Mobile Stations (MS) in an indoor environment using wireless technology. Their solution is a fingerprint-based positioning system that overcomes the problem of the relative effect of doors and walls on signal strength and is independent...

    Provided By Reed Elsevier

  • White Papers // Dec 2008

    Interconnection of Distributed Memory Models

    In this paper, the authors present a framework to formally describe and study the interconnection of distributed shared memory systems. Using it allows them to classify the consistency models in two groups, depending on whether they are fast or not. In the case of non-fast consistency models, they show that...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Towards an Architecture for Semiautonomous Robot Telecontrol Systems

    The design and development of a computational system to support robot - operator collaboration is a challenging task, not only because of the overall system complexity, but furthermore because of the involvement of different technical and scientific disciplines, namely, Software Engineering, Psychology and Artificial Intelligence, among others. In the authors...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    New Receipt-Free Voting Scheme Using Double-Trapdoor Commitment

    It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme for large scale elections. However, in the following paper, proved that the scheme was...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    Defending RFID Authentication Protocols Against DoS Attacks

    In this paper, the authors present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, the authors point out that in the O-FRAP protocol, the server can be subject to...

    Provided By Reed Elsevier

  • White Papers // Jan 2010

    Hidden Attribute-Based Signatures Without Anonymity Revocation

    The authors propose a new notion called hidden attribute-based signature, which is inspired by the recent developments in attribute-based cryptosystem. With this technique, users are able to sign messages with any subset of their attributes issued from an attribute center. In this notion, a signature attests not to the identity...

    Provided By Reed Elsevier

  • White Papers // Sep 2009

    Enhancements of Authenticated Multiple Key Exchange Protocol Based on Bilinear Pairings

    The author proposes two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, the authors show an impersonation attack on their pairing-based authenticated key exchange protocol. They demonstrate that any attacker can impersonate an entity to share multiple session keys with...

    Provided By Reed Elsevier

  • White Papers // Dec 2008

    Secure Authenticated Group Key Agreement Protocol in the MANET Environment

    Due to dynamic and infrastructure-less nature of Mobile Ad hoc NETwork (MANET) environment, there exist number of threats as mobile devices and nodes could freely move around in MANET such as eavesdropping of communications channels, modification of sensitive m-commerce transactions, Denial of Service(DoS), vulnerabilities of impersonation by malicious insiders etc....

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    Optimized Link State Routing for Mobile Ad Hoc Networks

    Multipath routing protocols for Mobile Ad hoc NETwork (MANET) address the problem of scalability, security (confidentiality and integrity), lifetime of networks, instability of wireless transmissions, and their adaptation to applications. The authors' protocol, called MultiPath OLSR (MP-OLSR), is a multipath routing protocol based on OLSR. The Multipath Dijkstra Algorithm is...

    Provided By Reed Elsevier

  • White Papers // Jan 2011

    Timing Aware Information Flow Security for a JavaCard-Like Bytecode

    Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world. Information-flow aware analyses track the flow of information through the program to prevent such leakages, but often ignore information flows through covert channels even though they...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Distributed Push-Pull Estimation for Node Localization in Wireless Sensor Networks

    A great deal of research achievements on localization in Wireless Sensor Networks (WSNs) has been obtained in recent years. Nevertheless, its interesting challenges in terms of cost-reduction, accuracy improvement, scalability, and distributed ability design have led to the development of a new algorithm, the Push-Pull Estimation (PPE). In this algorithm,...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    On the Source Switching Problem of Peer-to-Peer Streaming

    Peer-To-Peer (P2P) streaming has been proved a popular and efficient paradigm of Internet media streaming. In some applications, such as an Internet video distance education system, there are multiple media sources which work alternately. A fundamental problem in designing such kind of P2P streaming system is how to achieve fast...

    Provided By Reed Elsevier

  • White Papers // Jun 2011

    Low Energy Operation in WSNs: A Survey of Preamble Sampling MAC Protocols

    The limited energy resources of sensor nodes are among the most important constraints in Wireless Sensor Networks (WSNs). Consequently, the Medium Access Control (MAC) layer design is crucial, due to its influence on the transceiver, which is the most energy-consuming component of a sensor node. Among the different MAC protocols...

    Provided By Reed Elsevier

  • White Papers // Apr 2011

    Quantitative Analysis of the Hidden Terminal Problem in Preamble Sampling WSNs

    Collisions in preamble sampling WSNs cause a high waste of resources due to the mandatory transmission of a long preamble before every message. Moreover, when hidden terminals are present, collisions are even more noticeable since the vulnerability time is proportional to the long preamble duration. This effect reduces considerably the...

    Provided By Reed Elsevier

  • White Papers // Dec 2008

    Flexible Forward Error Correction Codes With Application to Partial Media Data Recovery

    Conventionally, linear block codes designed for packet erasure correction are targeted to recover all the lost source packets per block, when the fraction of lost data is smaller than the redundancy overhead. However, these codes fail to recover any lost packets, if the number of erasures just exceeds the limit...

    Provided By Reed Elsevier

  • Webcasts // Jun 2009

    Extend Your IT Security to Deal With the Social Generation and the New Internet

    The attendee of this webcast will explain the benefits and the security threats that the social generation internet poses the organisation. The presenter will show the popular methods used to infect, steal and use personal data using the new internet applications, the impacts to both the user, the services themselves...

    Provided By Reed Elsevier

  • Webcasts // Mar 2009

    Engendering Effective Web Security on a Tight Budget (or How to Have Your Security Cake and Eat It)

    The Internet has changed beyond anything could have foreseen just five years ago. It is no longer a browsing medium: it is full of Web 2.0 applications, real time communications challenges and a whole range of threats that are designed to piggy back on this new usage. The presenters of...

    Provided By Reed Elsevier

  • Webcasts // Aug 2009

    Implementing Effective End-Point Security and Data Encryption in the Modern IT Environment

    The IT security world has changed. Web 2.0, hybrid malware and advanced hacking techniques are now part of the threat landscape. Add in the fact that organised criminal gangs are now operating relatively freely on the Internet and in the real world, and it's no small wonder that the average...

    Provided By Reed Elsevier

  • White Papers // Dec 2008

    Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility

    With the significant advances in Information and Communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). This computing utility, like all other four existing utilities, will provide the basic level...

    Provided By Reed Elsevier

  • White Papers // Jun 2009

    A Survey of MAC Based QoS Implementations for WiMAX Networks

    This paper presents a comprehensive survey of proposed Quality of Service (QoS) mechanisms in the Media Access Control (MAC) sublayer of WiMAX based wireless networks. QoS support in WiMAX is a fundamental design requirement, and is considerably more difficult than in wired networks, mainly because of the variable and unpredictable...

    Provided By Reed Elsevier

  • White Papers // Dec 2008

    SafeMesh: A Wireless Mesh Network Routing Protocol for Incident Area Communications

    Reliable broadband communication is becoming increasingly important during disaster recovery and emergency response operations. In situations where infrastructure-based communication is not available or has been disrupted, an Incident Area Network needs to be dynamically deployed, i.e. a temporary network that provides communication services for efficient crisis management at an incident...

    Provided By Reed Elsevier

  • Webcasts // Dec 2009

    Securing Your Data Against the Latest Multi-Vectored Security Threats

    Data leaks, losses and thefts are now firmly on the boardroom agenda Why? Because organizations are being embarrassed, sued and even put out of business because of this serious security issue. This webcast can help the organization from becoming another victim. Research shows that 62% of fraud is committed by...

    Provided By Reed Elsevier

  • Webcasts // Nov 2009

    Cloud Security - New Threats on the Horizon

    Cloud computing means a range of different things to different people, but one thing that people are agreed on, and that is the need for cloud security. This webcast will explain why most organisations need to re-engineer their existing IT security infrastructure before adding the benefits of cloud computing to...

    Provided By Reed Elsevier

  • Webcasts // Oct 2009

    The Security Implications of Web 2.0

    There can be no doubt - the collaborative benefits of Web 2.0technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. But, just as Web 2.0 brings new and significant advantages to the business table, so there are new and highly threatening security...

    Provided By Reed Elsevier

  • Webcasts // Oct 2009

    Implementing Least-Privilege Security Management in Complex Linux and UNIX Environments

    o Virtually all government and private security regulations, such as Sarbanes-Oxley and the Payment Card Industry's Data Security Standard, have a few common requirements: that access to sensitive data and servers be granted only to those whose job function requires it, and that those individuals are granted only the privileges...

    Provided By Reed Elsevier

  • Webcasts // Sep 2009

    Protecting Your Critical Data on a Budget

    The threats that organisation now faces have grown significantly more dangerous in recent times. At the same time, the mobility of the workforce - complete with their laptops, netbooks, handhelds and smartphones - has soared. It's against this backdrop that now there is need to defend against a rising level...

    Provided By Reed Elsevier